This homelab has six primary attack layers. See references/attack-surface.md for the full inventory of known weaknesses per layer.
| Network | Cilium default-deny, profile CCNPs | Prometheus scrape baseline (any port), escape hatch window, intra-namespace freedom | | Gateway | Coraza WAF, Istio Gateway API | WAF FAILOPEN, PL1 bypass, gateway allowedRoutes.from: All |
| Authentication | OAuth2-Proxy, Authelia 2FA, app-native | 7-day cookie, brute force window, Vaultwarden admin redirect bypass | | Authorization | PodSecurity admission, RBAC | Minimal custom RBAC, homepage ClusterRole reads cluster | | Container | Security contexts, Istio mTLS | Gluetun root+NETADMIN+no mesh, Cilium agent SYSADMIN |
Kubernetes 家庭实验室的对抗性安全测试方法。涵盖网络政策 规避、身份验证绕过、权限升级、凭证盗窃和供应链攻击。 在以下情况下使用:(1) 红队针对家庭实验室进行测试,(2) 验证网络策略实施, (3) 在外部网关上测试 WAF 绕过,(4) 探测身份验证层, (5) 评估容器逃逸路径,(6) 审核 RBAC 和服务帐户, (7)测试OCI推广管道供应链安全。 触发器:“安全测试”、“红队”、“渗透测试”、“渗透测试”、“攻击面”、 “WAF绕过”、“网络策略规避”、“权限提升”、“横向移动”、 “凭证盗窃”、“容器逃逸”、“RBAC 审计”、“安全审计”、“漏洞” 来源:ionfury/homelab。